Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Michael Raymond

Last Week in Ransomware: Week of August 2nd

You may have trained employees about phishing emails but are they properly trained about phony call centers? According to the Microsoft security blog, the BazaCall campaign seems to be more...

Read More

Last Week in Ransomware: Week of July 26th

In previous weeks we mentioned that the group behind the REvil ransomware attack has vanished from the internet, which makes it particularly surprising that a universal decryption key has been...

Read More

Last Week in Ransomware: Week of July 19th

This past week hasn’t seen quite as much activity as others, likely due to the new ransomware task force created in the US and the mysterious disappearance of REvil and...

Read More

Data Migration Guide: Strategy Success & Best Practices

For most businesses, data migration is a necessary business process that takes place on a regular basis. Whether it’s implementing a new system or shifting information to more secure storage...

Read More

Last Week in Ransomware: Week of July 12th

Over the past week, more information has come to light on the REvil ransomware attack. It seems that the attack what’s launched prematurely as the attackers discovered that a patch...

Read More

Last Week in Ransomware: Week of July 5th

Ransomware in the News Before we get to the major ransomware attack that occurred over the holiday weekend, let’s take a look at some of the other stories from the...

Read More

Last Week in Ransomware: Week of June 28th

Ransomware in the News If you’re a small or medium business using locally hosted cloud storage drives by a popular brand you need to disconnect them from the internet immediately....

Read More

Last Week in Ransomware: Week of June 21st

Ransomware in the News When Darkside launched their ransomware attack on American infrastructure they got a lot of attention from US law enforcement which ultimately led to their shutdown in...

Read More

How Hackers Spoof DNS Requests With DNS Cache Poisoning

Domain Name Server (DNS) Spoofing is a cyber attack that tricks your computer into thinking it’s going to the correct website, but it’s not. Attackers use DNS cache poisoning to...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.